Details

The Red Hat Security Response Team has rated this update as having criticalsecurity impact. Common Vulnerability Scoring System (CVSS) base scores,which give detailed severity ratings, are available for each vulnerabilityfrom the CVE links in the References section.

Mozilla Firefox is an open source web browser. XULRunner provides the XULRuntime environment for Mozilla Firefox.

Several flaws were found in the processing of malformed web content. A webpage containing malicious content could cause Firefox to crash or,potentially, execute arbitrary code with the privileges of the user runningFirefox. (CVE-2013-1682, CVE-2013-1684, CVE-2013-1685, CVE-2013-1686,CVE-2013-1687, CVE-2013-1690)

It was found that Firefox allowed data to be sent in the body ofXMLHttpRequest (XHR) HEAD requests. In some cases this could allowattackers to conduct Cross-Site Request Forgery (CSRF) attacks.(CVE-2013-1692)

Timing differences in the way Firefox processed SVG image files couldallow an attacker to read data across domains, potentially leading toinformation disclosure. (CVE-2013-1693)

Two flaws were found in the way Firefox implemented some of its internalstructures (called wrappers). An attacker could use these flaws to bypasssome restrictions placed on them. This could lead to unexpected behavior ora potentially exploitable crash. (CVE-2013-1694, CVE-2013-1697)

Red Hat would like to thank the Mozilla project for reporting these issues.Upstream acknowledges Gary Kwong, Jesse Ruderman, Andrew McCreight,Abhishek Arya, Mariusz Mlynski, Nils, Johnathan Kuskos, Paul Stone, BorisZbarsky, and moz_bug_r_a4 as the original reporters of these issues.

For technical details regarding these flaws, refer to the Mozillasecurity advisories for Firefox 17.0.7 ESR. You can find a link to theMozilla advisories in the References section of this erratum.

All Firefox users should upgrade to these updated packages, which containFirefox version 17.0.7 ESR, which corrects these issues. After installingthe update, Firefox must be restarted for the changes to take effect.

Solution

Before applying this update, make sure all previously released erratarelevant to your system have been applied.